OFFLINE AND ONLINE SIGNATURE VERIFICATION SYSTEMS: A SURVEY
نویسندگان
چکیده
منابع مشابه
Use of the Shearlet Transform and Transfer Learning in Offline Handwritten Signature Verification and Recognition
Despite the growing growth of technology, handwritten signature has been selected as the first option between biometrics by users. In this paper, a new methodology for offline handwritten signature verification and recognition based on the Shearlet transform and transfer learning is proposed. Since, a large percentage of handwritten signatures are composed of curves and the performance of a sig...
متن کاملOffline Signature Verification System Based on the Online Data
Most of the signature verification work done in the past years focused either on offline or online approaches. In this paper, a different methodology is proposed, where the online reference data acquired through a digitizing tablet serves as the basis for the segmentation process of the corresponding scanned offline data. Local windows are built over the image through a self-adjustable learning...
متن کاملOFFLINE SIGNATURE VERIFICATION SYSTEM - A REVIEW Pooja
The person’s signature is an important biometric attribute which is used for authentication and identification of individual. Today, Signature verification is one of the most important features. There are many parameters for security checking like password, pin code, but signature recognition is the very popular because it is quite accurate and cost efficient too. On the other hand, it’s very d...
متن کاملImproved Online/Offline Signature Schemes
The notion of on-line/off-line signature schemes was introduced in 1990 by Even, Goldreich and Micali. They presented a general method for converting any signature scheme into an on-line/off-line signature scheme, but their method is not very practical as it increases the length of each signature by a quadratic factor. In this paper we use the recently introduced notion of a trapdoor hash funct...
متن کاملEfficient Certificateless Online/Offline Signature
Public key cryptography usually is computationally more expensive than symmetric key systems. Due to this low power or resource constrained devices cannot make use of public key cryptosystems easily. There is a need for high security in these devices since many of these devices perform complex tasks which includes interaction with third party cloud infrastructures. These cloud infrastructures a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2014
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2014.0315064